Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 41314. Отображено 100.
05-01-2012 дата публикации

System and method for providing secure identification solutions

Номер: US20120001726A1
Принадлежит: Neology Inc

The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.

Подробнее
05-01-2012 дата публикации

Optimized interface between two network elements operating under an authentication, authorization and accounting protocol

Номер: US20120005356A1
Автор: Vesa Pauli HELLGREN
Принадлежит: NOKIA SIEMENS NETWORKS OY

According to several embodiments of the present invention, a single session according to an authentication, authorization and accounting protocol, with a network element carrying out a policy and charging rule function is created, wherein the specific session may be used to manage and/or report policy and/or charging control rules.

Подробнее
12-01-2012 дата публикации

Method of performing a secure application in an nfc device

Номер: US20120011572A1
Автор: Charles Walton, Gary Chew
Принадлежит: Inside Secure SA

The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is established between first and second NFC devices, the first NFC device transmits by the contactless link an identifier of a secure processor of the first NFC device, the second NFC device transmits by the contactless link an application identifier, the secure processor transmits by the contactless link first authentication data allowing the authentication of the secure processor of the first NFC device, the second NFC device transmits to an application server the first authentication data, the application server transmits to an authentication server the first authentication data and second authentication data) to authenticate the application and authorizes the two NFC devices to execute the application only if the secure processor and the application are authenticated.

Подробнее
02-02-2012 дата публикации

Ad hoc service provider's ability to provide service for a wireless network

Номер: US20120027001A1
Принадлежит: Qualcomm Inc

Exemplary embodiments are directed to devices and methods for supporting a wireless access point for one or more mobile clients. A mobile device may include a first module for supporting access to a network via a first wireless access protocol. The device may further include a second module for supporting a wireless access point for the one or more mobile clients to the network using a second wireless access protocol.

Подробнее
02-02-2012 дата публикации

Method of identifying telematics calls

Номер: US20120028656A1
Принадлежит: GENERAL MOTORS LLC

A method of identifying telematics calls includes the steps of receiving at a vehicle telematics unit a paging message used to connect a call over a wireless carrier system; determining at the vehicle telematics unit if the paging message used to connect the call includes a Mobile Identification Number (MIN) or a Mobile Equipment Identifier (MEID); and establishing the call and, if the vehicle telematics unit determines that the paging message includes the MEID, entering into a mode in which the vehicle telematics unit uses a modem for receipt and transmission of data

Подробнее
16-02-2012 дата публикации

Security Connection Establishing Method and Related Wireless Device and Wireless Host

Номер: US20120040617A1
Принадлежит: PixArt Imaging Inc

A security connection establishing method for a wireless device and a wireless host is disclosed. The security connection establishing method includes the steps of allowing the wireless device to generate a trigger signal, allowing the wireless host to receive the trigger signal, allowing the wireless host to generate an accepting signal according to the trigger signal, allowing the wireless device and the wireless host to directly establish a security connection according to the accepting signal, and providing a connection result.

Подробнее
08-03-2012 дата публикации

Method and system for optimizing authentication procedures in media independent hanodver services

Номер: US20120057706A1
Автор: Anirudh Bhatt
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A method and system for establishing security association mechanism between a Mobile Node (MN) and a plurality of Point of Services (PoS) are provided. The method includes sending a first request from primary PoS to secondary PoS. The primary PoS then receives a first response along with a derived first key. The first key is derived at the secondary PoS. The method further includes receiving a second request from the MN at the primary PoS. The method then derives a second key based on a MN identity and the derived first key. Thereafter, the method sends a second response along with a second key from the primary PoS to the MN. Further, the method establishes communication between the MN and secondary PoS based on the second key received by the MN and the second key generated at the secondary PoS.

Подробнее
22-03-2012 дата публикации

Method and Apparatus for Negotiation Control of Quality of Service Parameters

Номер: US20120069763A1
Автор: Jie Zhao, Shuhui Hu, Xin Zhong
Принадлежит: Huawei Technologies Co Ltd

A method and an apparatus for negotiation control of Quality of Service (QoS) parameters are provided. The method includes: obtaining, by a High Rate Packet Data (HRPD) Serving Gateway (HSGW), static QoS parameters of a User Equipment (UE), where the static QoS parameters include static QoS parameters related to an Access Point Name (APN); establishing, by the HSGW, a Packet Data Network (PDN) connection corresponding to the APN with the UE; and sending, by the HSGW, static QoS parameters related to the APN corresponding to the PDN to an access network to enable the access network to perform QoS authorization, according to the static QoS parameters related to the APN corresponding to the PDN, for establishing an air interface bearer for the UE.

Подробнее
29-03-2012 дата публикации

Security system providing temporary personnel access based upon near-field communication and related methods

Номер: US20120075059A1
Принадлежит: Research in Motion Ltd

A security system may include a plurality of electronic devices, each having a unique identification (ID) associated therewith and configured to generate a temporary security code based upon the unique ID. The system may further include at least one mobile wireless communications device including a first Near-Field Communication (NFC) circuit, and a mobile controller configured to receive the temporary security code from a given electronic device from among the plurality of electronic devices. The system may also include an access control device associated with a personnel access position and including a second NFC sensor and a security controller. The security controller may be configured to receive the temporary security code from the first NFC sensor via NFC communications, selectively grant personnel access based upon the received temporary security code, and determine the unique ID associated with the given electronic device.

Подробнее
29-03-2012 дата публикации

Operator control of resources for roaming subscribers

Номер: US20120076125A1
Автор: Dirk Kopplin
Принадлежит: Telefonaktiebolaget LM Ericsson AB

The present invention relates to a solution for handling visiting subscribers in a visited communication network ( 109 ) with wireless access for user equipment ( 110 ) and enforcing policy and charging rules for the visited subscriber home operator. Operator specific policy and charging rules are stored in the visited communication network, for instance using a policy and charging rules function ( 104 ) in the visited communication network and operator specific rules may be stored in a separate database ( 105 ) in the visited communication and in communication with the policy and charging rules function.

Подробнее
29-03-2012 дата публикации

Method And System For Enabling Rendering Of Electronic Media Content Via A Secure Ad Hoc Network Configuration Utilizing A Handheld Wireless Communication Device

Номер: US20120079112A1
Принадлежит: Broadcom Corp

A handheld wireless communication device (HWCD) establishes an ad hoc network comprising interconnected networks for a user. The HWCD gains access to content on a first device and controls communication of the content from the first device via the HWCD to a second device. The HWCD enables the second device to consume the content. The content may be streamed from the first device via the HWCD to the second device. The first device is a service provider network device or other network device. The access may be authenticated and/or secure. Secure access to the content is extended from the first device to the second device. The ad hoc network is configured and/or reconfigured until communication is complete. The HWCD comprises multiple wireless interfaces. The ad hoc network comprises a PAN, WLAN, WAN and/or cellular network. The HWCD may hand-off among base stations during communication of the content.

Подробнее
05-04-2012 дата публикации

Wireless accessory device pairing transfer between multiple host devices

Номер: US20120083208A1
Принадлежит: Apple Inc

A wireless communications system includes an accessory device and multiple host devices. A host device pairs wirelessly with an accessory device using a unique link key, detects a primary trigger event and responds by transferring automatically its pairing with the accessory device to a second host device while all devices remain within wireless range of each other. The pairing transfer involves communicating the link key to the second host device, unpairing the accessory device from the first host device, and establishing a wireless pairing of the accessory device to the second host device. The primary trigger event can involve establishing a ported connection between host devices. A secondary trigger event results in the first host device automatically reclaiming its pairing with the accessory device. An accessory device can also select and pair with one of multiple host devices in response to a specific user gesture detected by the accessory device.

Подробнее
05-04-2012 дата публикации

Femtocell approved user list management via short message service (sms)

Номер: US20120083270A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A system and methodology that facilitates user friendly and/or dynamic femtocell access provisioning based on Short Message Service (SMS) communication is provided. In particular, the system can enable users to update and/or view a femto access control list associated with a femtocell by employing SMS messages. Moreover, the system can receive a SMS message from a user equipment (UE) requesting an action (e.g., add, remove, and/or view an entry within a femto access control list) associated with femtocell access and identify a femtocell associated with the UE. Further, the system can analyze the SMS, request confirmation to perform the action, and execute the action on receiving confirmation from the UE.

Подробнее
19-04-2012 дата публикации

Method, system and apparatus for locking information

Номер: US20120094636A1
Принадлежит: Huawei Technologies Co Ltd

A method, system, and apparatus are described for locking information. Specifically, a server sends a lock message carrying lock object information to a mobile terminal; the mobile terminal locks a lock object according to the lock message, the lock object corresponding to the lock object information. With the solutions provided in the embodiments of the invention, a server may lock information for a mobile terminal, so as to prevent other servers from manipulating the information.

Подробнее
19-04-2012 дата публикации

Method and Device for Managing Authentication of a User

Номер: US20120096529A1
Принадлежит: France Telecom SA

A method and apparatus are provided for managing authentication of a user of a telecommunications network of an operator. The method includes the following steps: on receipt of a request for access to a service provided by the operator of this network by the user, issuing a request for identification of an authentication server destined for an authentication location server, the request including at least one identifier of the user; and on receipt of a response comprising an identifier of an authentication server associated with the identifier of the user, issuing a request for authentication of the user at the server identified for the requested service.

Подробнее
26-04-2012 дата публикации

System and Method for Providing User Notifications

Номер: US20120101952A1
Принадлежит: HEADWATER PARTNERS I LLC

A process includes storing on an end user device (EUD) one or more notification actions corresponding to one or more notification requests, the EUD being associated with a service plan having a network service usage limit; performing a device action that reflects a past or intended use of the one or more network services; receiving by the EUD one of the one or more notification requests from a network element in response to the device action; performing by the EUD one of the one or more notification actions in response to the one of the one or more notification requests, the one of the one or more notification actions causing the EUD to retrieve a notification message portion associated with a status of the use, the portion being separate from the one of the one or more notification requests; and presenting the notification message on an EUD user interface.

Подробнее
03-05-2012 дата публикации

Techniques for mobile device authentication

Номер: US20120110329A1
Принадлежит: Individual

A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD.

Подробнее
10-05-2012 дата публикации

Management of multiple connections to a security token access device

Номер: US20120117636A1
Автор: Neil P. Adams
Принадлежит: Research in Motion Ltd

An electronic device, system and method for automatically managing wireless connections with a plurality of other devices are provided. The electronic device may be a security token access device and may be adapted to wirelessly pair and optionally securely pair with other devices. Connection information, which may comprise security information, is maintained at the electronic device for each connected device. When a connected device becomes stale, the electronic device implements one or more steps to manage the stale device's connection.

Подробнее
17-05-2012 дата публикации

System and method for providing wireless networks as a service

Номер: US20120122424A1
Принадлежит: BelAir Networks Inc

A wireless network system is provided. The system comprises a wireless network controller and a plurality of access points and/or femtocells. The wireless network controller is in communication with each of the plurality of access points and/or femtocells via an access data network, and is configured to perform one or more network control functions for the benefit of the plurality of access points and/or femtocells. The network control functions may be selected from management and operation, client authentication, mobility, and per-user administration. The wireless network controller is remotely located and operated with respect to the plurality of access points and/or femtocells.

Подробнее
24-05-2012 дата публикации

Secure Information Storage and Delivery System and Method

Номер: US20120131656A1
Принадлежит: Intersections Inc

A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is configured to receive at least one data entry. A mobile vault server coupled to the vault repository creates a mobile vault on a mobile device based on the secure vault and is capable of authenticating the mobile device based on user authentication information. The mobile vault server includes a mobile device handler that communicates with the mobile device. A synchronization utility determines whether the at least one data entry on the secure vault is transferable to or storable on the mobile vault. and transfers the data entry from the secure vault to a corresponding data entry on the mobile vault if the at least one data entry on the secure vault is determined to be transferable to or storable on the mobile vault.

Подробнее
24-05-2012 дата публикации

Mobile Posture-based Policy, Remediation and Access Control for Enterprise Resources

Номер: US20120131685A1
Принадлежит: MobileIron Inc

A mobile device management system that monitors the security state of one or more mobile devices and sets indicators related to such security state. Enterprise network applications, such as an email application, can access the security state information when making access control decisions with respect to a given mobile device.

Подробнее
07-06-2012 дата публикации

System for preventing establishment of unauthorized communication

Номер: US20120139691A1
Автор: Hiroshi Mori
Принадлежит: Tokai Rika Co Ltd

A system that prevents unauthorized establishment of wireless bidirectional communication between a communication master and a communication terminal. The system includes a strength measurement signal transmission circuit that transmits a received signal strength measurement signal, which is used to measure received signal strength at the communication terminal, a number of times with different transmission strengths during a single wireless bidirectional communication session. A received signal strength measurement circuit measures the received signal strength of the received signal strength measurement signal whenever the received signal strength measurement signal is received by the communication terminal. A measurement result transmission circuit transmits received signal strength measurement results as a single response signal to the communication master from the communication terminal during the single communication session. A check circuit checks whether the current bidirectional communication is authorized based on the received signal strength measurement results from the communication terminal.

Подробнее
14-06-2012 дата публикации

Method and apparatus for providing a subsidy-lock unlock procedure

Номер: US20120149329A1
Принадлежит: MOTOROLA MOBILITY LLC

A method and apparatus for providing a secure subsidy-lock unlock procedure for a wireless device is disclosed. A security subsidy-lock unlock password is received. Registration of the wireless device is initiated when the received password is determined to be correct. Notification of a registration status is received. Network access is restricted or allowed based on the registration status.

Подробнее
14-06-2012 дата публикации

Methods, systems, and computer program products for role- and locale-based mobile user device feature control

Номер: US20120149337A1
Принадлежит: Armstrong Quinton Co LLC

Methods, systems, and computer program products for role- and locale-based mobile user device feature control are disclosed. According to one aspect, a method for controlling at least one feature of a mobile user device based on a locale and a role of a user of the mobile user device is disclosed. The method includes storing, in a database, role information defining a plurality of different roles assigned to different user types and corresponding locale-based mobile user device feature control policies. In response to a mobile user device being within the locale, a role of the mobile user device is determined. A policy corresponding to the role is selected from a database. At least one feature of the mobile user device is controlled based on the locale-based feature control policy.

Подробнее
21-06-2012 дата публикации

Method for conrolling access of subscribers in wireless communication system supporting femto cell and apparatus for the same

Номер: US20120157051A1

Disclosed is a method for controlling access of subscribers of a gateway in a communication system supporting a femto cell, the method including: by user equipment (UE), receiving a first access request message, which makes a request to access a femto base station (BS), from the femto BS; directly acquiring a business subscriber database (DB), which includes a list of UE admittable to access the femto BS, from a DB module; and determining whether to admit the access of the UE on the basis of the business subscriber DB, wherein the determining whether to admit the access of the UE includes admitting the access of the UE if a user equipment identifier (UE ID) for identifying the UE is included in the list of UE.

Подробнее
28-06-2012 дата публикации

Apparatus and method for providing mobile service in a mobile commnucation network

Номер: US20120166571A1
Автор: Sung-Il Jin
Принадлежит: KT Corp

Apparatus, system, and method for providing a mobile service to a mobile node in a mobile communication network. In order to provide the mobile service, a request may be received from a mobile node for connecting to a mobile router. When the mobile node is authorized to access the mobile router, the authorized mobile node may be connected to a file server in the mobile router. Then, a storage service may be provided to the authorized mobile node.

Подробнее
28-06-2012 дата публикации

Method and System for Authentication Event Security Policy Generation

Номер: US20120167168A1
Принадлежит: Arbor Networks Inc

A method and system allows for the deployment of security policies into the higher layers of the OSI model. Specifically, it allows for the establishment of security policies at layer 4 and higher, by monitoring authentication flows and using these flows as the basis for establishing security policies which then can be used as a basis for assessing the operation of the network.

Подробнее
05-07-2012 дата публикации

Method And Apparatus For Protecting Against A Rogue Certificate

Номер: US20120173874A1
Принадлежит: Qualcomm Inc

Disclosed is a method for protecting against a rogue certificate. In the method, a web client receives a first certificate from a server during an initial session. The first certificate has a first certificate chain to an authority certificate signed by a certificate authority. The web client receives a second certificate during a subsequent session. The second certificate has a second certificate chain to a signed authority certificate. The web client assigns a signature security rating to each chain certificate in the first and second certificate chains. The web client compares the signature security rating of each corresponding chain certificate in the first and second certificate chains. The web client treats the second certificate as insecure if the signature security rating of a chain certificate in the second certificate chain is lowered from that of a corresponding chain certificate in the first certificate chain.

Подробнее
12-07-2012 дата публикации

System and method for data mining and security policy management

Номер: US20120179687A1
Автор: Weimin Liu
Принадлежит: McAfee LLC

A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a capture system.

Подробнее
19-07-2012 дата публикации

System and method for granting authorization of application in wireless communication system

Номер: US20120185912A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A system and a method for grant authorization of an application in a wireless communication system. A method for being assigned authorization of an application in a mobile station includes when an application is installed, transmitting permission request information for at least one authorization required by the application, to a server; when receiving a response message from the server, identifying authorization assigned to the application in the response message; and controlling the application using the assigned authorization.

Подробнее
26-07-2012 дата публикации

Methods, systems, and computer readable media for screening diameter messages within a diameter signaling router (dsr) having a distributed message processor architecture

Номер: US20120191847A1
Принадлежит: Tekelec Inc

According to one aspect, the subject matter described herein includes a method for screening Diameter messages within a Diameter signaling router (DSR) having a distributed message processor architecture. The method includes steps occurring at a DSR comprising a plurality of Diameter message processors, each configured to perform at least one Diameter function. The steps include receiving, at an ingress Diameter message processor of the Diameter message processors, a Diameter message from a Diameter peer node. The steps also include identifying, at a Diameter application message processor of the Diameter message processors, a Diameter message screening rule associated with the received Diameter message. The steps further include performing, at the Diameter application message processor of the Diameter message processors, a screening function associated with the identified Diameter message screening rule on the received Diameter message.

Подробнее
26-07-2012 дата публикации

Method and devices for secure communications in a telecommunications network

Номер: US20120191971A1
Принадлежит: France Telecom SA

A secure communications method is provided for use in a telecommunications network, wherein a transaction between an entity A and an entity B of the network comprises: entity A sending an authorization request to an Authorization Server S, in which request the entity A identifies itself and authenticates itself; the entity A declares to the Authorization Server its intention to communicate with a certain entity B; the Authorization Server determines a secret key that it shares with the entity B; the Authorization Server generates a session key and sends it to the entity A; the session key being a one-way function of the secret key and also being a function of an integer (transaction number) allocated to the transaction; the Authorization Server also generates a transaction identifier that is a function depending at least on the transaction number in non-invertible manner.

Подробнее
02-08-2012 дата публикации

Multi-device session pairing using a visual tag

Номер: US20120198531A1
Принадлежит: Microsoft Corp

One or more techniques and/or systems are disclosed for joining two or more devices in a multi-device communication session. A request is received from a first device, such as at a session hosting service on a remote server, to initiate a multi-device communication session, such on the session hosting service. A visual tag is sent to the first device, such as from the session service, where the visual tag comprises device-session pairing information, such as session service identification and session authorization. A multi-device communication session joining request is received from a second device, where the request from the second device comprises the device-session pairing information retrieved from the visual tag displayed by the first device, and captured by the second device.

Подробнее
02-08-2012 дата публикации

Shared Security Device

Номер: US20120198542A1
Принадлежит: International Business Machines Corp

A mechanism is provided for sharing one or more security appliances. A trusted system component associated with an application of a plurality of applications in a logically partitioned data processing system sets a destination address of a received packet to an address of a security appliance shared by the plurality of applications. The trusted system component sends the received packet to the security appliance. The trusted system component receives a response from the security appliance. The trusted system component determines whether the response indicates permitting the received packet to proceed to the intended recipient. The trusted system component sends the received packet to the recipient in response to the response indicating permitting the received packet to proceed.

Подробнее
09-08-2012 дата публикации

Method for remotely and automatically erasing information stored in sim-card of a mobile phone

Номер: US20120202462A1
Автор: Ashok Em Sudhakar
Принадлежит: Jayn International Pte Ltd

Embodiments of the present disclosure relate to a method and system for remotely and automatically erasing information stored in SIM card memory and mobile phone memory including memory card of a mobile phone 101 . The method includes sending a voice message comprising predetermined authentication parameters to a server 102 by an owner when the mobile phone 101 of the owner is lost. The method further includes authenticating the owner by the server 102 upon comparing the predetermined authentication parameters with the stored authentication parameters and sending activation signal by the server 102 to an erase application if the owner is authenticated. This signal will activate the erase application stored in the mobile phone 101 SIM card. The erase application generates destroy signal upon activation of the erase application to erase the information stored in the SIM card of the mobile phone 101.

Подробнее
09-08-2012 дата публикации

Methods and Apparatus for Identifying and Authorizing Location Servers and Location Services

Номер: US20120202517A1
Принадлежит: Qualcomm Inc

Techniques are provided which may be implemented in various methods, apparatus, and/or articles of manufacture to allow a mobile device to obtain certain location service(s) and/or the like from one or more computing devices that have been authorized for use. For example, in certain implementations, an authorizing location server may obtain a first message from a mobile device indicating a first set of location servers, determine a second set of location servers based, at least in part, on the first set of location servers, and transmit a second message to the mobile device indicating that the second set of location servers are authorized for location service related access by the mobile device.

Подробнее
09-08-2012 дата публикации

Systems and methods for network curation

Номер: US20120204243A1
Автор: John Gordon, Simon Wynn
Принадлежит: Individual

Systems and methods for network curation are disclosed. In some embodiments, a method comprises scanning, by a mobile device, an area to identify a network device for accessing a network, receiving, by the mobile device, a network identifier associated with the network device, providing a curation indicator request to a curation server, the curation indicator request comprising the network identifier, receiving a curation indicator from the curation server, the curation indicator being retrieved, based on the network identifier, from a database of a plurality of curation indicators, the curation indicator associated with a likelihood of intent to publicly share the network by the network device, comparing the curation indicator to an access setting, the access setting indicating acceptability of network access based on the likelihood of intent to publicly share the network by the network device, and accessing the network via the network device based on the comparison.

Подробнее
16-08-2012 дата публикации

Method of securing communication

Номер: US20120210134A1
Автор: Navroop Mitter
Принадлежит: Individual

A method for securing data to be transmitted between a plurality of devices which includes exchanging encryption keys between first and second devices of the plurality of devices, selecting digital rights management (DRM) features for the data which is to be transmitted from the first device, encrypting the data to be transmitted and the selected digital rights management features using at least one distinct key, transmitting the encrypted data and the selected DRM features to the second device and a third device, and decrypting the encrypted data on the second device using the exchanged encryption keys and displaying the data according to the selected DRM features.

Подробнее
16-08-2012 дата публикации

Method of managing authorization of private node b in a wireless communication system and related device

Номер: US20120210400A1
Автор: Chih-Hsiang Wu
Принадлежит: HTC Corp

A method of managing authorization of a private node-B coupled to a packet core network terminal in a wireless communication system. The method includes performing positioning measurement for the private node-B to generate a position information of the private node-B, providing the position information for the packet core network terminal, determining authorization validity of the private node-B according to the position information and home network coverage of the private node-B, and then rejecting the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.

Подробнее
30-08-2012 дата публикации

System and method for controlling access to electronic devices

Номер: US20120221666A1
Принадлежит: Openpeak Inc

A system and method of controlling access to one or more electronic devices is disclosed. The method can include the step of—out of a plurality of electronic devices—identifying a master device and a slave device. The master device can be configured to control access to at least one feature of the slave device, and the master device can be associated with a person who has supervisory authority over another person who uses the slave device. During an active session on the slave device, a pre-disablement warning can be sent to the slave device in which the pre-disablement warning can identify a first time period by which access to the feature of the slave device is to be prevented. A disablement message can be sent to the slave device, thereby preventing access to the feature of the slave device following the expiration of the first time period.

Подробнее
30-08-2012 дата публикации

Methods and apparatus to integrate logical and physical access control

Номер: US20120221695A1
Принадлежит: Research in Motion Ltd

Methods and apparatus to control access are described. One example method includes allowing physical access and logic access based on a credential associated with a mobile device, monitoring logical access by the mobile device, and revoking a physical access privilege based on termination of logical access by the mobile device. Other implementations are possible.

Подробнее
30-08-2012 дата публикации

Cryptographic sanction server and methods for use therewith

Номер: US20120221846A1
Принадлежит: ViXS Systems Inc

A sanction server includes a network interface that receives a request for media content from a client device and transmits first sanction data to a caching server and second sanction data to the client device. A sanction processing module generates the first sanction data based on a random number and generates the second sanction data based on the random number. The caching server generates first cryptographic data based on the first sanction data and sends the first cryptographic data to the client device. The client device generates second cryptographic data based on the first sanction data and sends the second cryptographic data to the caching server. The caching server generates a scrambling control word based on the first sanction data and the second cryptographic data. The client device generates the scrambling control word based on the second sanction data and the first cryptographic data.

Подробнее
13-09-2012 дата публикации

Wireless synchronization of data and software components over a wireless network compatible to ieee802.11 standard(s) for mobile devices

Номер: US20120230315A1
Принадлежит: Flexiworld Technologies Inc

Wireless synchronization of data and software components over IEEE802.11 standard(s) are herein disclosed and enabled. An information apparatus, which includes a wireless communication unit compatible with IEEE802.11, may access a wireless local area network (WLAN). To setup the wireless synchronization, the user connects the information apparatus to a wireless output device over a wired connection (e.g., USB) and selects the wireless output device. Information associated with the wireless output device is saved in the mobile information apparatus for enabling wireless synchronization. Next, the user connects the mobile information apparatus to the WLAN, and, depending on the availability of the wireless output device in the network, the information apparatus may lock a wireless connection to the wireless output device for wireless synchronization. A client application in the mobile information apparatus and output controller software in the wireless output device may be required to facilitate the wireless synchronization over the WLAN.

Подробнее
13-09-2012 дата публикации

Systems and methods for enabling temporary, user-authorized cloning of mobile phone functionality on a secure server accessible via a remote client

Номер: US20120233663A1
Принадлежит: ORTIZ and ASSOCIATES CONSULTING

Temporary, user-authorized cloning of physical mobile phone functionality via a secure server can enable physical mobile phone features to be accessed and controlled by a user from a remote client. A secure server can include mobile phone registration information, enable secure access by users via a remote client, maintain communication and synchronization with the mobile phone, receive data associated with the physical mobile phone when is not in communication with at least one of a supporting telecommunication network and the secure server, and enable the physical mobile phone user to obtain secure communication with the secure server via a remote client, access and manage cloned mobile phone data and communicate with third parties. Physical mobile phone user access to the secure server and cloned mobile phone functionality with the remote client can be terminated once the physical mobile phone user logs off of the secure server from the remote client.

Подробнее
13-09-2012 дата публикации

Method for authentication of a remote station using a secure element

Номер: US20120233685A1
Принадлежит: Qualcomm Inc

Disclosed is a method for authentication of a remote station by a management station using a secure element. In the method, the remote station receives an identity request from the secure element. The identity request includes a first challenge provided to the secure element by the management station. The remote station forwards an identity response to the secure element. The identity response includes a response to the first challenge that is signed by a key of the remote station, and the signed response to the first challenge is for use by the management station to authenticate the remote station.

Подробнее
04-10-2012 дата публикации

Marking one or more items in response to determining device transfer

Номер: US20120254740A1
Принадлежит: ELWHA LLC

A computationally implemented method includes, but is not limited to: determining that a computing device that was presenting one or more portions of one or more items and that was in possession of a first user has been transferred from the first user to a second user; and marking, in response to said determining, the one or more portions of the one or more items to facilitate the computing device in returning to the one or more portions upon the computing device being at least transferred back to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.

Подробнее
18-10-2012 дата публикации

Password input method using visual object

Номер: US20120266236A1
Принадлежит: Lenovo Singapore Pte Ltd

A method and apparatus is provided for switching from a regular desktop screen to a password input screen for a user to input a password. An apparatus may comprise a first screen display as the password input screen, a second screen display as the regular desktop screen, and a switching system. The switching system may be configured to switch a screen item position between the first screen display and the second screen display. The switching system may receive a user selection of a sequence of screen items as a password input and may switch operation of the apparatus between the first screen display to the second screen display.

Подробнее
25-10-2012 дата публикации

System and method for controlling mobile device access to a network

Номер: US20120270522A1
Принадлежит: McAfee LLC

The method may include intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.

Подробнее
25-10-2012 дата публикации

Methods to authenticate access and alarm as to proximity to location

Номер: US20120270560A1
Принадлежит: Houman Shafiezadeh, Moshir Kevin K, Sean Moshir

Methods for authenticating access and providing positional awareness using mobile phones. Embodiments for authenticating access include receiving identification indicia from a person seeking access, sending a message to a person having authority for access, and receiving either a second message indicating that the person has taken an affirmative action to indicate authorization, or a password that was provided in the first message. Access may be computer access or physical access, as examples. Methods of providing positional awareness include obtaining or storing location coordinates, monitoring the location of a mobile phone, and providing an alarm, for example, through a second mobile phone. In a number of embodiments, location coordinates are automatically obtained from Internet websites. In some embodiments, parents can monitor the location of their children to make sure they do not get too close to a reported residence of a registered sex offender, for instance.

Подробнее
08-11-2012 дата публикации

Terminal and Method for Binding SIM Card

Номер: US20120282901A1
Автор: Lijun Fang
Принадлежит: ZTE Corp

A terminal and a method for binding Subscriber Identification Module (SIM) cards are provided. During an initialization of a SIM card, the terminal sends a terminal profile command to inform related items of a SIM tool Kit (STK) supported by the SIM card. The SIM card provides the SIM card related operator information to the terminal by actively reporting a proactive command or providing menu items. The terminal judges whether the SIM card operator information of the STK function matches with the SIM card operator information stored in the terminal or not, if they match, the terminal allows the user to normally use the terminal; otherwise or the STK function does not provide the SIM card related operator information, the terminal does not allow the user to normally use the terminal. Therefore, the purpose of locking cards by the terminal is realized with the STK function of the SIM card.

Подробнее
08-11-2012 дата публикации

Electronic devices having adaptive security profiles and methods for selecting the same

Номер: US20120284779A1
Принадлежит: Apple Inc

Adaptive security profiles are supported on an electronic device. One or more security profiles may be automatically or selectively applied to the device based on the device's location and one or more geographic zone definitions. The security profiles may be used to determine the level of authentication or number of invalid authentication attempts for a particular feature or application or set of features or applications.

Подробнее
15-11-2012 дата публикации

Protected mode for mobile communication and other devices

Номер: US20120291101A1
Автор: Eric Ahlstrom, Jenna Lee
Принадлежит: Microsoft Corp

An electronic device includes at least one memory unit, a plurality of applications residing on at least one of the memory units and a database residing on at least one of the memory units. The database is configured to store a record specifying a subset of the plurality of applications that are to be inaccessible to a user when in a protected mode of operation. The protected mode is designed for a user (e.g., child or friend borrowing the device) who can potentially use the device with setting that are configured under the primary user's (e.g. parent, device administrator) supervision. The device also includes a user interface through which a primary user and not other users can specify the subset of the plurality of applications to be included in the record. A processor is operatively associated with the memory unit, the database and the user interface. The processor is configured to switch, in response to a request from the primary user and not other users, between a normal mode operation in which all of the applications in the plurality of applications are available for use and the protected mode of operation.

Подробнее
22-11-2012 дата публикации

System and method for application program operation on a wireless device

Номер: US20120297443A1
Автор: Shawn Kahandaliyanage
Принадлежит: Research in Motion Ltd

Embodiments described herein address mobile devices with non-secure operating systems that do not provide a sufficient security framework. More particularly, the embodiments described herein provide a set of applications to the device for providing security features to the non-secure operating system.

Подробнее
29-11-2012 дата публикации

Methods and apparatus to associate a mobile device with a panelist profile

Номер: US20120302222A1
Принадлежит: Individual

Methods and apparatus are disclosed to associate a mobile device with a panelist profile. An example method includes initializing a metering application on the mobile device to operate with partial functionality, parsing a message log with the metering application to identify an installation message, extracting a telephone number from the installation message and saving to a memory of the mobile device, sending an initialization message based on the extracted telephone number to prompt an authorization message, and enabling full functionality of the metering application in response to receiving the authorization message.

Подробнее
06-12-2012 дата публикации

Remote entry system

Номер: US20120311343A1
Принадлежит: Securicom NSW Pty Ltd

A system is disclosed for providing secure access to a controlled item, the system comprising a database of biometric signatures, a transmitter subsystem comprising a biometric sensor for receiving a biometric signal, means for matching the biometric signal against members of the database of biometric signatures to thereby output an accessibility attribute, and means for emitting a secure access signal conveying information dependent upon said accessibility attribute, wherein the secure access signal comprises one of at least a rolling code, an encrypted Bluetooth™ protocol, and a WiFi™ protocol, and a receiver sub-system comprising means for receiving the transmitted secure access signal and means for providing conditional access to the controlled item dependent upon said information.

Подробнее
06-12-2012 дата публикации

Service/mobility domain with handover for private short-range wireless networks

Номер: US20120311661A1
Автор: Mika Forssell
Принадлежит: Nokia Oyj

A system manages the integration of a private short-range wireless network into a service/mobility domain with handover of a wireless terminal device between access points registered with a domain server. The server maintains information specifying rules for responding to first wireless terminal devices authorized for private network access and to second wireless terminal devices authorized for shared network access, in response to requests for information on resources available from one or more access points registered with the server.

Подробнее
27-12-2012 дата публикации

Network-agnostic content management

Номер: US20120331537A1
Принадлежит: AT&T MOBILITY II LLC

System(s) and method(s) are provided for content management, e.g., exchange and manipulation, across devices provisioned through disparate network platforms. Devices can be mobile or stationary, and connect to provisioning network platforms through various network bearers. Through various secure protocols, a client component within a device secures access to content and provides secure delivery thereof. Directives for content manipulation are also delivered securely. Delivery of contents and directives are performed from device to device, routed via gateway nodes within a network platform that provisions the device. In addition, or alternatively, content management can be implemented through an intermediary component, which can also validate devices and secure delivery of content or directives. Alarm signaling among devices provisioned through disparate network platforms also can be securely conveyed. Intermediary component also can be exploited for content management among subscribers of disparate network providers.

Подробнее
27-12-2012 дата публикации

Authentication and authorization method for tasking in profile-based data collection

Номер: US20120331540A1
Принадлежит: Carrier IQ Inc

An apparatus and a new method of authentication and authorization of tasking requests to data collection agents on wireless devices directly makes use of public key cryptography, rather than depending on domain-name-based authenticated using the standard HTTPS chain-of-trust: A set of digital credentials is stored in the device's secure credential store. These credentials include at least one “supertasking authority” credential, as well as one or more normal “tasking authority” credentials. Profiles are only accepted by the agent if they are signed by a trusted tasking authority credential. Supertasking authority credentials thus serve as credential authorities (CAs) for tasking authority credentials.

Подробнее
03-01-2013 дата публикации

Rules based actions for mobile device management

Номер: US20130007245A1
Принадлежит: Fiberlink Communications Corp

Utilizing a server-based rules-based action framework, methods and systems gather status and configuration information about each of a plurality of mobile devices, which include devices from different mobile platforms. At the server, software processes monitor status information and respond automatically to changes, causing administrator-selected rules to be evaluated to determine if an action should automatically be initiated.

Подробнее
03-01-2013 дата публикации

Methods and Arrangements for Authorizing and Authentication Interworking

Номер: US20130007846A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

This disclosure relates to a portable communication device and a network-side authorization server, and to methods therein. By splitting the functionality of an OAuth authorization server and moving the authorization endpoint into, for instance a mobile phone, an authorization server within the mobile phone is provided. This mobile phone authorization server does not need to communicate with the network-side for getting an authorization code or an access token.

Подробнее
10-01-2013 дата публикации

Secure nfc payment transactions

Номер: US20130012125A1
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
10-01-2013 дата публикации

Secure near field communication transactions with authentication

Номер: US20130012126A1
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
10-01-2013 дата публикации

Enhanced Messaging with Language Translation Feature

Номер: US20130012173A1
Принадлежит: AT&T MOBILITY II LLC

A method for creating and managing a distribution list can include creating a distribution list at a voicemail system. The distribution list can include at least one recipient and at least one language preference for one or more of the at least one recipients. The method can further include selecting the created distribution list and recording an audio message to be sent to the at least one recipient. Translating the audio message into the at least one language preference for one or more of the at least one recipients thereby creating at least one translated audio message and sending the at least one translated audio message to the at least one recipient.

Подробнее
10-01-2013 дата публикации

System and Method for Protecting Data on a Mobile Device

Номер: US20130013933A1
Принадлежит: Research in Motion Ltd

Methods and systems are disclosed for protecting data on a mobile device. A data protection module on the mobile device receives a transmission including a secret key. The secret key is used in encrypting data on the device and is then deleted. Subsequent to an event detectable to the mobile device, the data protection module receives another transmission including said secret key. The secret key is then used to decrypt the encrypted data.

Подробнее
10-01-2013 дата публикации

System and method for selection of security algorithms

Номер: US20130014210A1
Принадлежит: NEC Corp

A method of managing security for a connection between a user device and a communications network including a plurality of base stations and a core network, the method including receiving at the core network security capability information for the user device connecting to the communications network via a first base station, retrieving security capability information at the core network for the first base station from a database that stores security capability information for the plurality of base stations, processing in the core network the security capability information for the user device and the security capability information for the first base station to select a security policy for a connection between the user device and the first base station, and transmitting the selected security policy to the first base station.

Подробнее
10-01-2013 дата публикации

Configuration of accessories for wireless network access

Номер: US20130014232A1
Принадлежит: Apple Inc

A portable computing device can enable an accessory to access a wireless network. In particular, the portable computing device can provide a wireless network access credential to the accessory. The accessory can thereafter use the wireless network access credential to access a wireless network. The portable computing device can additionally configure an access point that manages the wireless network to permit the accessory to join the wireless network.

Подробнее
17-01-2013 дата публикации

Intelligent parental controls for wireless devices

Номер: US20130017806A1
Принадлежит: Qualcomm Inc

Methods, systems and devices for controlling mobile device functions via a combination of parental control settings set by a parent-user and parental control settings set by a third party-user. A parental control server receives parental control settings and context criteria from a parent-user, and parental control settings from a third party user. The parental control server receives authorization from the parent-user to allow third party parental controls to control a child's device. When the context criteria identified by the parent is present (e.g., child device is in identified location, time of day, day of week, etc.), a combination of parental controls designated by the parent-user and the third party control the mobile device.

Подробнее
31-01-2013 дата публикации

System and method for prioritizing requests to a sim

Номер: US20130029726A1
Принадлежит: Qualcomm Inc

The method and system relate to prioritizing access and shaping traffic to the SIM such that the requests to the SIM that pertain to registering the wireless mobile device on a network are given a higher priority than other requests to the SIM. The higher priority requests that relate to registering the mobile device on a network may be processed by the SIM prior to at least one other request that is not related to registering the mobile device on the network.

Подробнее
07-02-2013 дата публикации

Near field communication slot based secure element with authentication prior to transaction

Номер: US20130035035A1
Автор: Michelle Fisher
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
07-02-2013 дата публикации

Secure device based nfc payment transactions

Номер: US20130035036A1
Автор: Michelle Fisher
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
07-02-2013 дата публикации

Mobile transactions using a generic nfc smart sticker with authentication

Номер: US20130035968A1
Автор: Michelle Fisher
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
07-02-2013 дата публикации

Infrastructure-Assisted Client Management using Synthesized Beacon Reports

Номер: US20130036188A1
Принадлежит: Aruba Networks Inc

Infrastructure-based client management uses synthesized beacon reports to effect client association with APs in a wireless digital network. Beacon reports are synthesized by having a plurality of APs in the network collect client reports and send those reports to a report process on the network. The report process accumulates client reports from the plurality of APs and selects one or more candidate APs to support a client. Selection may be made on reported SNR, AP loading, channel loading, AP characteristics, or a combination. The report process may produce blacklists and optionally whitelists for use by APs to use in processing client probe and connection requests.

Подробнее
14-02-2013 дата публикации

Procedure for the preparation and performing of a post issuance process on a secure element

Номер: US20130042325A1
Принадлежит: Individual

The invention relates to a method for enabling post issuance operation on a secure element connectable to a communication device. The method allows an SE controlling party to perform remotely operations such as creation of new security domains for an external party, loading, and installation of applications of an external party and management functions including personalization and activation of applications loaded on the SE for an external party. The method includes the steps of: collecting data stored on the SE suitable for identification of the SE and data for contacting the SE controlling party; creating an initial data packet from the collected data, sending the data packet to a party which can be the external party, an agent of the external party, the SE controlling party, an agent of the SE controlling party. The invention further relates to a communication device and a software application for implementing the method.

Подробнее
21-02-2013 дата публикации

Method and System for Controlling Access of Machine Type Communications Devices

Номер: US20130044596A1
Принадлежит: ZTE Corp

A method for controlling access of machine type communications device is provided by the present invention. The method includes: configuring an access priority to a machine type communications device; a network side configuring a corresponding access control parameter for an access priority needing an access control according to the current network load information, and sending the access priority needing the access control and the access control parameter to the machine type communications device; and according to an access priority of the machine type communications device and the received the access priority needing the access control and the access control parameter, the machine type communications device judging whether an access request can be initiated. A system for controlling access of the machine type communications device is also provided by the present invention.

Подробнее
07-03-2013 дата публикации

Image forming apparatus supporting peer-to-peer connection and method of managing security based on signal intensity thereof

Номер: US20130057898A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A method of managing security of an image forming apparatus that supports a P2P connection based on a signal intensity includes: measuring an intensity of a signal transmitted from an external wireless device by the image forming apparatus; and controlling an access of the wireless device by the image forming apparatus based on the measured signal intensity.

Подробнее
14-03-2013 дата публикации

Pico-cell extension for cellular network

Номер: US20130065558A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A pico-cell is located within a facility. The pico-cell has a wireless protocol for carrying calls placed to and from mobile devices in the facility. A call distributor is in communication with the pico-cell and handles calls carried by the pico-cell. The call distributor includes an embedded wireless switch for routing calls to and from mobile devices in the facility using the wireless protocol.

Подробнее
14-03-2013 дата публикации

Personalized Multimedia Services Using A Mobile Service Platform

Номер: US20130065559A1
Принадлежит: AT&T Intellectual Property II LP

A method for providing multimedia data from at least one controllable multimedia source to a mobile device includes providing a request path from the mobile device to a mobile service platform, receiving a request from the mobile device, obtaining a device profile from the mobile device, authenticating the identity of a user of the mobile device, and determining a user profile in response to the user identity. The method further includes authorizing control and access to the at least one multimedia source, providing a control channel from the mobile service platform to at least one multimedia server, providing multimedia data delivery information to the at least one multimedia server, and providing multimedia data to the mobile device in response to the request via the at least one multimedia server.

Подробнее
14-03-2013 дата публикации

Fight-through nodes for survivable computer network

Номер: US20130067574A1
Принадлежит: Architecture Technology Corp

A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, and a hypervisor executing on each one of the processing units; and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.

Подробнее
21-03-2013 дата публикации

Locking Mechanism Based on Unnatural Movement of Head-Mounted Display

Номер: US20130069787A1
Автор: David Petrou
Принадлежит: Google LLC

A wearable computer determines unnatural movements of a head-mounted display (HMD) and triggers a locking mechanism. In one embodiment, the wearable computer receives movement data from one or more sensors and determines that the movement of the HMD is unnatural. In one embodiment, the wearable computer receives movement data from one or more sensors and determines that the HMD is being worn by an unauthorized user. In response to determining an unnatural movement and/or an unauthorized user wearing the HMD, the wearable computer triggers a locking mechanism, which can beneficially provide security measures for the wearable computer.

Подробнее
21-03-2013 дата публикации

Enabling users to select between secure service providers using a key escrow service

Номер: US20130073848A1
Принадлежит: Google LLC

Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and services on a secure element installed on a device of the user. The device includes a service provider selector (“SPS”) module that provides a user interface for selecting the secure service provider. In one embodiment, the SPS communicates with a key escrow service that maintains cryptographic keys for the secure element and distributes the keys to the user selected secure service provider. The key escrow service also revokes the keys from deselected secure service providers. In another embodiment, the SPS communicates with a central TSM that provisions applications and service on behalf of the user selected secure service provider. The central TSM serves as a proxy between the secure service providers and the secure element.

Подробнее
21-03-2013 дата публикации

Public network access server having a user-configurable firewall

Номер: US20130074154A1
Автор: Joseph G. Barrett
Принадлежит: Facebook Inc

A user-configurable firewall and method in which a user-changeable security setting for a client computer is maintained by an access server through which a user accesses the public network. The user-changeable security setting can be used to specify which outside computers or network devices may access the client computer and what type of access to the client computer is allowed. If an attempt to access the client computer is made, the user-configurable security setting is checked to determine if the attempted access is allowed by the current security setting. If the attempted access is allowed by the current security setting, access is allowed to the client computer; otherwise, access is not allowed. If the user changes the user-configurable security setting, the changes to the user-configurable security setting are provided to the access server.

Подробнее
28-03-2013 дата публикации

Managing Mobile Device Applications in a Wireless Network

Номер: US20130078946A1
Принадлежит: Certicom Corp, Research in Motion Ltd

Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.

Подробнее
28-03-2013 дата публикации

Method of Subscription control in a Mobile Communication System

Номер: US20130078950A1
Автор: Liao Ching-YU
Принадлежит:

A method of subscription control for a first network control node in a mobile communication environment is disclosed. The method comprises receiving a trigger request message for triggering a mobile communication device from a machine-type communication (MTC) server, determining whether the trigger request message is valid according to whether one or more MTC features required by an application indicated in the trigger request message is subscribed or activated by the mobile communication device and is supported by a network control node of the mobile communication system, and accepting the trigger request message and forwarding the trigger request message to the network control node when the trigger request message is determined to be valid. 1. A method of subscription control for a network gateway node in a mobile communication system , comprising:receiving a trigger request message for triggering a mobile communication device from a machine-type communication (MTC) server;determining whether the trigger request message is valid according to whether one or more MTC features required by an application indicated in the trigger request message is subscribed or activated by the mobile communication device and is supported by a network control node of the mobile communication system; andaccepting the trigger request message and forwarding the trigger request message to the network control node when the trigger request message is determined to be valid.2. The method of claim 1 , further comprising:rejecting the trigger request message when the trigger request message is determined to be invalid.3. The method of claim 1 , wherein the network gateway node is a device trigger gateway claim 1 , a HSS or a HLR claim 1 , and the network control node is a serving MME or a serving SGSN of the mobile communication device.4. The method of claim 3 , wherein the network gateway node further sends information of the one or more MTC features to the network control node.5. The method ...

Подробнее
28-03-2013 дата публикации

Proximity Based Security Protocol for Processor-Based Systems

Номер: US20130078955A1
Автор: Jeffrey L. Huckins
Принадлежит: Individual

A security protocol may be implemented on a processor-based system by providing a wireless signal to a handheld device normally carried by the user. If a response is not received, it may be determined that the user is not sufficiently proximate to the device being accessed and that, therefore, the person accessing the device is not authorized. An appropriate security protocol may be implemented as a result.

Подробнее
28-03-2013 дата публикации

Systems and Methods for Multi-Device Wireless SIM Management

Номер: US20130079059A1
Автор: Nicholas S. Huslak
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Devices, systems and methods are disclosed for automated multi-device, multi-persona wireless SIM management. A virtual SIM database associated with a user is maintained on the mobile service provider's network. Such a virtual SIM database contains multiple personas for that user. For each of the user devices they wish to use on the mobile service network, the user is furnished with one “stub” SIM to be installed on the user device, onto which may be loaded any one of the personas maintained by the virtual SIM database. Upon an event, a selected user device downloads a selected persona from the network and loads it onto its stub SIM, so that the selected device is now registered on the network with that persona.

Подробнее
28-03-2013 дата публикации

Creating and maintaining a security policy

Номер: US20130081102A1
Принадлежит: International Business Machines Corp

An approach for managing a security policy is provided. First, second, and third specification sets are received after being independently generated by different practitioners. The first specification set maps service-to-service communications. The second specification set maps the services to devices on which the services are placed. The third specification set maps the devices to one or more network addresses. The received specification sets are algorithmically combined to create packet filtering rule statements. The security policy is generated as packet filtering rules based on the combined specification sets and the packet filtering rule statements. An application deployment modification includes independently editing specification set(s) that are affected by the modification, without knowledge of specification set(s) that are unaffected by the modification. An updated security policy may be generated by an incremental update to an existing security policy without requiring replacement of the entire security policy.

Подробнее
28-03-2013 дата публикации

Mobile device management apparatus and method based on security policies and management server for mobile device management

Номер: US20130081104A1
Принадлежит: Samsung SDS Co Ltd

A mobile device management apparatus has a policy storage unit that receives a plurality of security policies, which are classified into a plurality of profiles assigned priorities of activation and in which operating states of functions of a mobile device are defined. A management server supplies the profiles and the security policies to the mobile device. A policy implementation unit selectively activates the profiles so that control of the mobile device functions can be carried out with minimal communication, and also in response to changing events.

Подробнее
28-03-2013 дата публикации

PROVISIONING USER PERMISSIONS USING ATTRIBUTE-BASED ACCESS-CONTROL POLICIES

Номер: US20130081105A1
Автор: Giambiagi Pablo
Принадлежит: Axiomatics AB

An attribute-based access control policy (e.g., XACML policy) for a set of elements depends on attributes carried by elements in one of several predefined categories. In order to evaluate such policy for a set of elements, the invention provides a method including the steps of (I) selecting a primary category; (II) partitioning the elements in the primary category into equivalence classes with respect to their influence on the policy; and (III) using the equivalence classes to replace at least one policy evaluation by a deduction. The result of the evaluation may be represented as an access matrix in backward-compatible format. The efficiency of the policy evaluation may be further improved by applying partial policy evaluation at intermediate stages, by forming combined equivalence classes containing n-tuples of elements and/or by analyzing the influence of each element by extracting functional expressions of maximal length from the policy. 1. A computer-implemented method of evaluating an attribute-based access control , ABAC , policy for a set of elements , which are arranged in a computer system and belong to one of several predefined categories selected from subjects , resources , actions and environments ,wherein the access control policy comprises functional expressions which depend on attributes, each pertaining to elements in one of several predefined categories, each element in the set being associated with at least one attribute value assumed by an attribute of the element, andwherein the policy controls access of subjects in the set of elements to resources in the set of elements in accordance with values of the policy, including Permit and Deny,the method comprising the steps of:i) selecting one of the predefined categories as a primary category;ii) for the selected category, performing the substeps of:ii-1) extracting, from the policy, expressions containing attributes in no other than the selected category;ii-2) extracting, from elements in the ...

Подробнее
04-04-2013 дата публикации

Priority assignments for policy attachments

Номер: US20130086240A1
Принадлежит: Oracle International Corp

Techniques for resolving conflicts between web service policies that are attached (via LPA and/or GPA metadata) to a policy subject (e.g., a WS client/service endpoint). In one set of embodiments, a priority value can be assigned to each policy attached to a policy subject via the policy's corresponding policy attachment metadata file. These priority values can be taken into account when determining whether one policy should be given precedence over another, conflicting policy attached to the same policy subject. In certain embodiments, as part of this determination, the priority value of a policy can be given greater weight than the scope at which the policy is attached.

Подробнее
04-04-2013 дата публикации

Method to Safeguard the Authorized Access to a Field Device used in Automation-Technology

Номер: US20130086646A1
Принадлежит: Endress + Hauser Process Solutions AG

A method of safeguarding the authorized access to field a device used in automation-technology, wherein the field device comprises an internet protocol capable interface as well as an interface for near field communication. The method comprises a unique factory installed access code for an authorized field device user is stored in the field device or clearly assigned to the field device; before delivery of the field device from a field device supplier to a field device user The unique factory installed access code for an authorized field device user is read from the field device through the near field communication interface means of a mobile service unit with the use of a Security App, made available by the field device supplier, or through an alternatively made available, and secure, channel of communication; access authorization for the field device is established by means of the Security App for at least one authorized field device user; and operation of the field device is accomplished by the authorized field device user with the established access authorization by means of the mobile service unit or the internet protocol capable interface. 19-. (canceled)10. A method to safeguard the authorized access to field devices used in automation-technology , wherein the field device comprises an internet protocol capable interface and an interface for near field communication , the method comprises the steps of:storing in the field device or clearly assigned to the field device before delivery of the field device from a field device supplier to a field device user, a unique factory assigned access code for an authorized field device user;the unique factory assigned access code for an authorized field device user from the field device through the near field communication interface by means of a mobile service unit with the use of a Security App, made available by the field device supplier, or through an alternatively made available, and secure, channel of communication; ...

Подробнее
11-04-2013 дата публикации

Dynamic session migration between network security gateways

Номер: US20130091264A1
Принадлежит: Varmour Networks Inc

A method and apparatus is disclosed herein for migrating session information between security gateways are disclosed. In one embodiment, receiving, at a first security gateway, session information associated with a session corresponding to a network connection, the session information having been transferred from a second security gateway, the first and second security gateway being separate physical devices; and thereafter performing security processing for the session at the first security gateway.

Подробнее
11-04-2013 дата публикации

NETWORK APPLIANCE FOR CUSTOMIZABLE QUARANTINING OF A NODE ON A NETWORK

Номер: US20130091534A1
Принадлежит: Lockdown Networks, Inc.

A system, method, and apparatus are directed to managing access to a network. An agent may intercept a network packet transmitted by an enforcement point in response to a request from a device to join the network. The agent identifies, based on the network packet, a port number on the enforcement point at which the request is received. The agent may transmit the port number to a NACA to enable security enforcement operations to be performed on the device. Another device may reside outside the quarantined network and be enabled by the NACA to direct a remediation measure to be performed on the device using at least the port number. The NACA may spoof an ARP response with an address of the NACA to restrict access to resources. The NACA may also place the device into one of a plurality of quarantined networks. 1. A method , comprising:intercepting a network packet transmitted to a device by an enforcement point in a network, wherein the network packet is transmitted in response to a request from the device to join the network;determining information identifying a port on the enforcement point at which the request is received, wherein the information identifying the port is determined by evaluating the contents of the intercepted network packet;establishing a network connection to a network access control appliance (NACA) in the network; andtransmitting the information identifying the port to the NACA to enable security enforcement operations to be performed on the device via the NACA, wherein the security enforcement operations include;selecting a first quarantined network from a plurality of quarantined networks if the first quarantined network is not managing another device, wherein devices on different quarantined networks are inhibited from accessing each other; andcausing the device to be quarantined by placing the device on the first quarantined network such that communications over the network by the device are restricted and traffic for the device is filtered ...

Подробнее
11-04-2013 дата публикации

MOBILE WIRELESS COMMUNICATIONS DEVICE HAVING VALIDATION FEATURE AND RELATED METHODS

Номер: US20130091585A1
Принадлежит: RESEARCH IN MOTION LIMITED

A mobile wireless communications device may include a wireless transceiver and a controller coupled to the wireless transceiver. The controller may be configured to determine if an email address is associated with the mobile wireless communications device. The controller may further be configured to wirelessly send a validation request to a validation server based upon the email address, and wait for a validation email to be wirelessly received from the validation server based upon the validation request if the email address is associated with the wireless communications device, and if the validation email is wirelessly received, then validate access an application based upon the validation email. 1. A mobile wireless communications device comprising:a wireless transceiver; and determine if an email address is associated with the mobile wireless communications device,', 'wirelessly send a validation request to a validation server based upon the email address, and', 'wait for a validation email to be wirelessly received from the validation server based upon the validation request if the email address is associated with the wireless communications device, and if the validation email is wirelessly received, then validate access to an application based upon the validation email., 'a controller coupled to said wireless transceiver, said controller configured to'}2. The mobile wireless communications device according to claim 1 , wherein said controller is configured to discontinue waiting for the validation email claim 1 , if the validation email is not wirelessly received within a predetermined time.3. The mobile wireless communications device according to claim 1 , wherein said controller is configured to discontinue waiting for the validation email claim 1 , if the validation email is not wirelessly received prior to a user-input override.4. The mobile wireless communications device according to claim 1 , wherein the validation email comprises a unique login key.5. ...

Подробнее
18-04-2013 дата публикации

Method and System for Information Transmission

Номер: US20130094487A1
Автор: Mo Sun, TONG Rui, Xiaoyun Zhou
Принадлежит: ZTE Corp

The present invention discloses a method and system for information transmission. Said method includes: an Evolved Packet Data Gateway (ePDG) notifying a Policy and Charging Rules Function (PCRF) entity of the location information of a User Equipment (UE); the PCRF entity sending the location information of the UE to a Broadband Policy Control Function (BPCF) entity. The method and system provided by the present invention solve the problem that the BPCF in a fixed network can not initiate an S9* session to the PCRF entity.

Подробнее
18-04-2013 дата публикации

System and Method for Wireless Communications Activity Within a Predetermined Area and for Generating Messages to Selected Communication Devices

Номер: US20130095851A1
Принадлежит: AT&T MOBILITY II LLC

A system and method is disclosed for detecting the presence and level of wireless communications activity within a predetermined area, without disclosing the identity of the wireless users, and for generating a message to certain information and communications devices in response to the detection of a predetermined level of wireless communications activity within the predetermined area. The information detected also may include information relating to the general direction and rate of movement of detected wireless devices. The message generated in response to the detection of wireless communications activity may include wireless messages, including Short Message Service (SMS) messages, to persons desiring or needing to receive such information; messages to public officials and other interested persons; and automatic signals to devices such as computers, computer networks (including the internet and wireless networks), facsimile machines, signs, lights, loudspeakers, and other devices providing information through other communication and information media.

Подробнее
18-04-2013 дата публикации

SECURE DATA INTERCHANGE

Номер: US20130097664A1
Принадлежит: Pinpoint, Incorporated

A secure data interchange system enables information about bilateral and multilateral interactions between multiple persistent parties to be exchanged and leveraged within an environment that uses a combination of techniques to control access to information, release of information, and matching of information back to parties. Access to data records can be controlled using an associated price rule. A data owner can specify a price for different types and amounts of information access. 1. A method of providing access to user profile information , the method comprising:storing in memory a profile for a user, the profile comprising personal information regarding the user;establishing a policy for access to the user's personal information, the policy comprising an access rule that provides users with different levels of access to the user's personal information for different users, wherein the access rule is controlled by the owner of the personal information;providing online access to the user's personal information by the users in accordance with the policy;establishing a price rule for access to one or more user profiles by one or more agents; andproviding access to information in the one or more user profiles based on the price rule.2. The method of claim 1 , further comprising:matching the users based on their profiles. This application is a divisional of and claims priority under 35 U.S.C. §120 to U.S. application Ser. No. 12/417,747 entitled “Secure Data Interchange,” filed on Apr. 3, 2009, which is a continuation of U.S. application Ser. No. 09/699,098, filed on Oct. 27, 2000, which claims the benefit of U.S. Provisional Application No. 60/161,640, filed Oct. 27, 1999, titled Secure Data Interchange, and U.S. Provisional Application No. 60/206,538, filed May 23, 2000, titled Secure Data Interchange, all of which are incorporated herein by reference in their entirety.1. Field of the InventionThe Secure Data Interchange invention describes a system to allow a ...

Подробнее
25-04-2013 дата публикации

APPARATUS AND METHOD FOR MANAGING CONTROL INFORMATION OF APPLICATION IN PORTABLE TERMINAL

Номер: US20130102280A1
Автор: LEE Myoung-Ju
Принадлежит: SAMSUNG ELECTRONICS CO., LTD.

An apparatus and method to control an application in a portable terminal are provided. A method to manage an application includes confirming control information that at least one application installed in the portable terminal requires, selecting the at least one application requiring control information whose use is restricted among a plurality of applications installed in the portable terminal, and restricting a running of the selected at least one application. 1. A method to control an application in a portable terminal , the method comprising:confirming a control information that at least one application installed in the portable terminal requires;selecting at least one application requiring the control information whose use is restricted among a plurality of applications installed in the portable terminal; andrestricting a running of the selected at least one application.2. The method of claim 1 , wherein confirming the control information further comprises:confirming a control information that each application in the portable terminal requires in a database comprising information of an application installed in the portable terminal.3. The method of claim 1 , wherein restricting the running of the selected at least one application comprises:restricting the running of service using the control information in the selected at least one application requiring the control information.4. The method of claim 1 , wherein restricting the running of the selected at least one application comprises:deleting the selected at least one application requiring the control information.5. The method of claim 4 , further comprising:deleting information from a database that contains information of the selected at least one application installed in the portable terminal.6. A method to install an application in a portable terminal claim 4 , the method comprising:confirming a control information that an application to be installed in the portable terminal requires; andblocking the ...

Подробнее
25-04-2013 дата публикации

Unlock Screen

Номер: US20130102366A1
Принадлежит: Microsoft Corp

Unlock screen and notification techniques are described. In an implementation, an unlock screen is displayed by a mobile communications device that indicates that the mobile communications device is locked. If an input is detected to remove the lock by dragging across a Y-axis of the display device, an animation is displayed that gives an appearance that the unlock screen is being removed and the lock on the mobile communications device is removed.

Подробнее
25-04-2013 дата публикации

Policy Enforcement in a Secure Data File Delivery System

Номер: US20130104185A1
Принадлежит: Axway Inc.

A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server applies a policy established by a policy authority of the sender to the package. Since the server both forms the package through interaction with the sender and applies the policy, violations of the policy by the package can be brought to the sender's attention during an interactive session with the sender and before encryption of all or part of the package. As a result, the sender is educated regarding the policy of the sender's policy authority, and the sender can modify the package immediately to comport with the policy. The server delivers the package to intended recipients by sending notification to each recipient and including package identification data, e.g., a URL by which the package can be retrieved. 1. (canceled)2. A method comprising:in an secure interactive session between a client sender associated with an enterprise and a web server accessible to the client sender via a public internet, receiving data specifying one or more recipients, a subject and message data, and identifying one or more data files for inclusion in a package submitted for delivery to the specified one or more recipients;evaluating the received data for violation of a sender policy framework specified and configurable by a policy authority with which the client sender is associated and, in the case of a violation, allowing the client sender to, during the secure interactive session, correct the data and resubmit the package for delivery; andeffectuating delivery of the package at least in part by sending a notification message to each of the specified one or more recipients, the notification message containing a private universal resource locator (private URL) by which the respective recipient may securely retrieve the package.3. The method of claim 2 ,wherein the evaluating of received data for violation of the sender policy ...

Подробнее
25-04-2013 дата публикации

METHOD AND SYSTEM FOR MANAGING CONFIDENTIAL INFORMATION

Номер: US20130104191A1
Принадлежит: PortAuthority Technologies Inc.

A method and a system for information management and control is presented, based on modular and abstract description of the information. Identifiers are used to identify features of interest in the information and information use policies are assigned directly or indirectly on the basis of the identifiers, allowing for flexible and efficient policy management and enforcement, in that a policy can be defined with a direct relationship to the actual information content of digital data items. The information content can be of various kinds: e.g., textual documents, numerical spreadsheets, audio and video files, pictures and images, drawings etc. The system can provide protection against information policy breaches such as information misuse, unauthorized distribution and leakage, and for information tracking. 1. A method for monitoring information content carried in a medium , the method comprising:monitoring said medium for said information;seeking elementary information units within objects of said information being monitored in said medium;identifying said elementary information units; anddeducing information about the content of said information objects from identification of said elementary information units found within said objects.2. A method according to claim 1 , wherein said medium comprises at least one of the following:a distribution channel; anda storage medium.3. A method according to claim 1 , wherein said information objects comprise at least one simple information object claim 1 , said simple information object comprising one of the following:an elementary information unit;a set of elementary information units; andan ordered set of elementary information units.4. A method according to claim 1 , wherein said elementary information units comprise at least one of the following:a sentence; a sequences of words; a word; a sequence of characters; a character; a sequence of numbers; a number; a sequence of digits; a digit; a vector; a curve; a pixel; a block ...

Подробнее